Khoury News
Filter your search
Showing 9 of 1572 results
-
-
General
Media coverage roundup: Suspicious Tor node research by Professor Guevara Noubir
- September 1, 2016
Professor Guevara Noubir and PhD student Amirali Sanatinia conducted research on the Tor network, a group of volunteer-operated servers that allows people to improve their privacy and security on the […] -
General
Amazon employee takes advantage of CCIS ALIGN program
- August 29, 2016
By Shandana Mufti Many people would be done with school after earning an undergraduate degree and an MBA. Not Andrew Dickens (MSCS ’17). Andrew is currently working on his second […] -
General
CCIS launches three new degree programs
- August 29, 2016
By Shandana Mufti Intro CCIS has announced three new degree programs for its undergraduate and graduate students. The programs – BS in Data Science, MS in Data Science and MS […] -
General
From co-op to employee: CCIS student to start work at Google
- August 29, 2016
By Shandana Mufti Receiving and accepting job offers for life after graduation always brings a sense of relief. Prachi Bhansali (MSCS ’16) recently felt that relief after accepting a position […] -
General Scientific American
Computers can sense sarcasm? Yeah, right
- August 26, 2016
"Irony or sarcasm requires a notion of context. It is quite different from spam or even [textual] sentiment analysis," says Byron Wallace, an assistant professor at Northeastern University's College of Computer and Information Science. Trying to incorporate some notion of context; that's what's cool about this." -
General NPR
How Big, Really, Is The Zika Outbreak In Florida?
- August 24, 2016
"Zika is one of those diseases that is always like an iceberg — you just see the tip," says Alessandro Vespignani, a computer scientist at Northeastern University in Boston, who has been tasked with modeling the spread of the virus. -
New proof techniques for adaptive security – Zahra Jafargholi – 8.25.16
- August 24, 2016
Master’s Thesis Defense Abstract Selective security refers to the case where the attacker decides on some parameters of the attack before the attack even begins. In contrast, adaptive security refers […] -
Showing 9 of 1572 results